Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 658 matches
- 2010
- Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. IACR Cryptol. ePrint Arch. 2010: 16 (2010) - Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo:
Signing on Elements in Bilinear Groups for Modular Protocol Design. IACR Cryptol. ePrint Arch. 2010: 133 (2010) - Mohammad Reza Sohizadeh Abyaneh:
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack. IACR Cryptol. ePrint Arch. 2010: 402 (2010) - Mohammad Reza Sohizadeh Abyaneh:
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2010: 463 (2010) - Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash:
Cryptographic Agility and its Relation to Circular Encryption. IACR Cryptol. ePrint Arch. 2010: 117 (2010) - Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-Source Network Coding. IACR Cryptol. ePrint Arch. 2010: 183 (2010) - Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan:
Sanitizable signatures with strong transparency in the standard model. IACR Cryptol. ePrint Arch. 2010: 175 (2010) - Jae Hyun Ahn, Matthew Green, Susan Hohenberger:
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications. IACR Cryptol. ePrint Arch. 2010: 422 (2010) - Joseph A. Akinyele, Christoph U. Lehmann, Matthew Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin:
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2010: 565 (2010) - Martin R. Albrecht, Kenneth G. Paterson:
Breaking An Identity-Based Encryption Scheme based on DHIES. IACR Cryptol. ePrint Arch. 2010: 637 (2010) - A. N. Alekseychuk:
Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids. IACR Cryptol. ePrint Arch. 2010: 348 (2010) - Subidh Ali, Debdeep Mukhopadhyay:
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault. IACR Cryptol. ePrint Arch. 2010: 451 (2010) - Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES using a Single Multiple-Byte Fault. IACR Cryptol. ePrint Arch. 2010: 636 (2010) - José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. IACR Cryptol. ePrint Arch. 2010: 339 (2010) - Didier Alquié:
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree. IACR Cryptol. ePrint Arch. 2010: 71 (2010) - Didier Alquié:
Approximating Addition by XOR: how to go all the way. IACR Cryptol. ePrint Arch. 2010: 72 (2010) - Elena Andreeva, Bart Mennink, Bart Preneel:
On the Indifferentiability of the Gröstl Hash Function. IACR Cryptol. ePrint Arch. 2010: 298 (2010) - Elena Andreeva, Bart Mennink, Bart Preneel:
Security Reductions of the Second Round SHA-3 Candidates. IACR Cryptol. ePrint Arch. 2010: 381 (2010) - José de Jesús Angel Angel, Guillermo Morales-Luna:
Solinas primes of small weight for fixed sizes. IACR Cryptol. ePrint Arch. 2010: 58 (2010) - Benny Applebaum:
Key-Dependent Message Security: Generic Amplification and Completeness. IACR Cryptol. ePrint Arch. 2010: 513 (2010) - Benny Applebaum, Danny Harnik, Yuval Ishai:
Semantic Security Under Related-Key Attacks and Applications. IACR Cryptol. ePrint Arch. 2010: 544 (2010) - Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals:
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 559 (2010) - Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio César López-Hernández:
Faster Explicit Formulas for Computing Pairings over Ordinary Curves. IACR Cryptol. ePrint Arch. 2010: 526 (2010) - Sarang Aravamuthan:
Separable Hash Functions. IACR Cryptol. ePrint Arch. 2010: 253 (2010) - Frederik Armknecht, Carsten Elsner, Martin Schmidt:
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design. IACR Cryptol. ePrint Arch. 2010: 302 (2010) - Frederik Armknecht, Andreas Peter, Stefan Katzenbeisser:
A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP. IACR Cryptol. ePrint Arch. 2010: 501 (2010) - Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. IACR Cryptol. ePrint Arch. 2010: 478 (2010) - Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. IACR Cryptol. ePrint Arch. 2010: 316 (2010) - Tomer Ashur, Orr Dunkelman:
Linear Analysis of Reduced-Round CubeHash. IACR Cryptol. ePrint Arch. 2010: 535 (2010) - Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. IACR Cryptol. ePrint Arch. 2010: 220 (2010)
skipping 628 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-04 05:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint